Prevention, Detection, Recovery E.T.C
Prevention, Detection, Recovery E.T.C
Prevention, Detection, Recovery E.T.C
SECURITY
QUESTION: Explain the various techniques and approaches used to secure computer systems
Make sure that your policy details the limits on access to and dissemination of personal data
about your employees, temps and others who might be targets of investigations. Mishandling this
data can have severe consequences, including legal action. Specify who is allowed to access
what data, under which circumstances, and with whom they are allowed to share this
penalties, make sure your security policy spells out the consequences of misusing company
resources.
This is the property of being genuine and being able to be verified and trusted that is confidence
users are who they say they are and that each input arriving at the system came from a trusted
source.
You can't depend on users to be responsible for all their configurations, but if you're using
Microsoft's Active Directory service, you can use group policies to lock down desktops across
your enterprise.Group policies allow a security manager to set configuration details for the OS
and its components (Internet Explorer, Windows Media Player, etc.), as well as other apps. For
example, you can change the settings for each of Internet Explorer's security zones, enforce the
use of your organization's content filtering internet proxy and even forbid the use of unsigned
third-party macros in Microsoft Office apps. Windows itself comes with a number of sample
template files, and more are available from Microsoft's website or from the Windows or Office
Resource Kits. In addition, make sure access rights to network folders are applied on a strict
need-only basis.
a) Accountability
This is an additional security goal that generates the requirement for actions of an entity to be
traced uniquely to that entity.This supports nonrepudiation, deterrence, fault isolation, intrusion
detection and prevention and after-action recovery and legal action. Secure systems are not yet
achievable goal, we must be able to trace a security breach to a responsible party.Systems must
keep records of their activities to permit later forensic analysis to trace security breaches or to aid
in transaction disputes.
b) Host Based
A host usually refers to the individual computer or devices that are connected to and
communicate over a network. At the host level, threat detection systems are installed on the
individual devices and monitor all traffic to and from that single device. Malicious activity is
c) Network Based
With this technique, strategic points in the network have their traffic monitored. A dedicated
device can be used to analyze the traffic. It is used in conjunction with the Ethernet layer of the
Disaster recovery is generally a planning process and it produces a document which ensures
businesses to solve critical events that affect their activities. Such events can be a natural disaster
(earthquakes, flood, etc.), cyber–attack or hardware failure like servers or routers.There are
several steps you can use in disaster recovery of computer security some of them are the
following;
I. The server room should have an authorized level. For example: only IT personnel should
II. In the server room there should be a fire alarm, humidity sensor, flood sensor and a
temperature sensor.
IV. The connectivity to internet is another issue and it is recommended that the headquarters
should have one or more internet lines. One primary and one secondary with a device that
offers redundancy.
V. If you are an enterprise, you should have a disaster recovery site which generally is
located out of the city of the main site. The main purpose is to be as a stand-by as in any
Derrick R. (2013) Windows 2012 Server Network Security: Securing Your Windows Network Systems
Derrick R. (2011) Security for Microsoft Windows System Administrators: Introduction to Key